System and method for secure and/or interactive dissemination of information

a technology of information dissemination and information security, applied in the field of interactive and secure information dissemination, can solve problems such as cumbersome practical use, compromising security, and affecting the security of prior art encryption systems

Inactive Publication Date: 2008-07-03
CEELOX
View PDF20 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0014]These and other important aspects of the present inventi

Problems solved by technology

While data encryption can be an effective method of securing data communicated via the Internet, prior art encryption systems suffer from various problems and limitations.
However, symmetric encryption requires the sender to communicate the encryption key to the recipient electronically, which can compromise the security of the transaction, or by a non-electronic method, which is too cumbersome for practical use.
This architecture can compromise the security of encrypted data because if an unintended user discovers the private key used to decrypt an encrypted data package, the user will also be abl

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for secure and/or interactive dissemination of information
  • System and method for secure and/or interactive dissemination of information
  • System and method for secure and/or interactive dissemination of information

Examples

Experimental program
Comparison scheme
Effect test

first embodiment

[0044]FIG. 2 illustrates an architecture of the present teachings implemented, for example, on the exemplary computer network of FIG. 1. The embodiment illustrated in FIG. 2 broadly comprises the interaction of four separate software modules including a sender client 36, a recipient client 38, a main server 40, and a key server 42. The sender client 36 and the recipient client 38 are separate software applications running on separate computers. However, the sender client 36 and the recipient client 38 are functionally identical, or substantially functionally identical, and therefor each is operable to send as well as receive transfer data. In other words, the sender client 36 is operable to function as a recipient client when receiving a secure data package, and the recipient client 38 is operable to act as a sender client when sending a secure data package. Therefore, when reference is made herein to the “client,” the “clients,” the “sender client 36,” or the “recipient client 38,”...

second embodiment

[0084]FIG. 11 illustrates a conventional computing environment wherein a text processor such as MICROSOFT NOTEPAD™ is visible in the computing environment, such as the desktop of the MICROSOFT WINDOWS™ operating system. While the illustrated window 116 is a word processor, it will be appreciated that substantially any application that is compatible with the host operating environment and operable to transfer data to the data buffer may be used with the client 36. As illustrated in FIG. 12, the user selects or highlights the portion of the data that he or she wishes to encode. In the window 116 of FIG. 12 the entire body of text is highlighted. The user then selects the user interface element 118 which is, in this case, present in the notification area of the WINDOWS™ task bar. Selecting the interface element 118 causes the client 36 to present a context menu 120. The user selects the text option to enable the client 36 to encode the user-selected text and move it to a buffer as expl...

third embodiment

[0088]In a third embodiment the client 36 encodes the transfer data by merging the transfer data with a separate file using conventional steganography techniques. This embodiment of the client 36 is illustrated in FIGS. 15 and 16. As illustrated in FIG. 15, a conventional computing environment presents a canvas 126, a user interface element 118 associated with a sender client 36, an image file 128, and a transfer data file 130. The transfer data file 130 is encoded or encrypted in the separate image file 128 (in this case, an image file) when both the transfer data file 130 and the separate image file 128 are placed in the canvas 126. For example, the user first selects the separate data file 128 and places it in the canvas 126 using a conventional drag-and-drop or cut-and-paste operation.

[0089]The user then places the transfer data file 130 into the canvas in the same way. The program prompts the user to submit identification and authentication information, creates an encryption ke...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An interactive information dissemination system includes a media server (210) for receiving a plurality of media elements and storing the media elements in a database. A sender client (200) enables a first user to identify message data, a recipient identifier, and a media element from the database of media elements. A recipient client (202) presents the media element to a second user associated with the recipient identifier. The recipient client (202) further presents the message data to the second user when the second user performs a predetermined action, such as submitting authentication information or requesting the message data, to receive the message data. The message data may be secured by requiring sender and recipient authentication, and by encoding the data using a private encoding key and data package identifier managed by a main server (206) and a key server (208).

Description

RELATED APPLICATION[0001]The present application is a nonprovisional patent application and relates to earlier-filed U.S. nonprovisional patent application titled “SYSTEM AND METHOD OF SECURE ENCRYPTION FOR ELECTRONIC DATA TRANSFER”, Ser. No. 11 / 538,867, filed Oct. 5, 2006. The identified earlier-filed application is hereby incorporated by reference into the present application.BACKGROUND OF THE INVENTION[0002]1. Field of the Invention[0003]Embodiments of the present invention relate to the field of interactive and secure dissemination of information. More particularly, embodiments of the present invention involve a system and method of associating message data with a media element, such as an advertisement, communicating the message data and the media element to a designated recipient, and presenting the message data to the recipient only after the media element has been presented to the recipient.[0004]2. Description of Prior Art[0005]Providing secure transfers of encoded data ove...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30
CPCG06F21/10G06F21/335G06F21/6209G06F2221/2107G06Q10/107G06Q20/3674H04L51/063G06Q30/02G06Q30/0251G06Q30/0273G06Q40/00H04L12/583G06Q20/382
Inventor PIZANO, ERIXPETERSON, DONALD R.
Owner CEELOX
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products